DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 
SMM:08-4
Sendmail Installation and Operation Guide
2.7. User Information Database .................................................................................................... 21
2.8. Per-User Forwarding (.forward Files) ...................................................................................
21
2.9. Special Header Lines ............................................................................................................. 22
2.9.1. Errors-To: .....................................................................................................................
22
2.9.2. Apparently-To: .............................................................................................................
22
2.9.3. Precedence .................................................................................................................... 22
2.10. IDENT Protocol Support ..................................................................................................... 22
3. ARGUMENTS ............................................................................................................................... 23
3.1. Queue Interval .......................................................................................................................
23
3.2. Daemon Mode .......................................................................................................................
23
3.3. Forcing the Queue ................................................................................................................. 24
3.4. Debugging .............................................................................................................................
24
3.5. Changing the Values of Options ............................................................................................
25
3.6. Trying a Different Configuration File ...................................................................................
25
3.7. Logging Traffic ......................................................................................................................
25
3.8. Testing Configuration Files ................................................................................................... 26
3.9. Persistent Host Status Information ........................................................................................
27
4. TUNING ......................................................................................................................................... 27
4.1. Timeouts ................................................................................................................................
27
4.1.1. Queue interval ..............................................................................................................
27
4.1.2. Read timeouts ...............................................................................................................
27
4.1.3. Message timeouts .........................................................................................................
29
4.2. Forking During Queue Runs ................................................................................................. 30
4.3. Queue Priorities .....................................................................................................................
30
4.4. Load Limiting ........................................................................................................................
30
4.5. Resource Limits .....................................................................................................................
31
4.6. Measures against Denial of Service Attacks .........................................................................
31
4.7. Delivery Mode ....................................................................................................................... 31
4.8. Log Level ............................................................................................................................... 32
4.9. File Modes .............................................................................................................................
32
4.9.1. To suid or not to suid? .................................................................................................
32
4.9.2. Turning off security checks ..........................................................................................
33
4.10. Connection Caching ............................................................................................................
35
4.11. Name Server Access ............................................................................................................ 36
4.12. Moving the Per-User Forward Files ....................................................................................
37
4.13. Free Space ...........................................................................................................................
37
4.14. Maximum Message Size .....................................................................................................
37
4.15. Privacy Flags .......................................................................................................................
37
4.16. Send to Me Too ...................................................................................................................
37
5. THE WHOLE SCOOP ON THE CONFIGURATION FILE ........................................................
38
5.1. R and S -- Rewriting Rules .................................................................................................. 38
5.1.1. The left hand side ......................................................................................................... 38
5.1.2. The right hand side ....................................................................................................... 39
5.1.3. Semantics of rewriting rule sets ...................................................................................
40